»ÝÆÕÔÙ´ÎÖÒÑÔ²¿·ÖSSD½«ÔÚÔËÐÐ4ÍòСʱºó·ºÆð¹ÊÕÏ£»£»£»£»£»ºÚ¿Íͨ¹ýÐ®ÖÆÂ·ÓÉÆ÷DNSÈö²¥OskiľÂí
Ðû²¼Ê±¼ä 2020-03-251.GE¹©Ó¦ÉÌÔâºÚ¿ÍÈëÇÖµ¼ÖÂÔ±¹¤ÐÅϢй¶
ͨÓÃµçÆø£¨GE£©ÌåÏÖÔÚÒ»¼ÒЧÀÍÌṩÉÌÔâµ½ºÚ¿ÍÈëÇÖºóÆäÏÖÈΡ¢Ç°ÈÎÔ±¹¤ÒÔ¼°Ïà¹ØÊÜÒæÈ˵ÄСÎÒ˽¼ÒÉí·ÝÐÅϢй¶¡£¡£¡£¡£GEÔÚÏò¼ÓÀû¸£ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÊý¾Ýй¶֪ͨÖгƣ¬£¬£¬£¬£¬£¬ÆäЧÀÍÌṩÉ̼ÑÄÜÓªÒµÁ÷³ÌЧÀÍÓÐÏÞ¹«Ë¾£¨Canon Business Process Services£¬£¬£¬£¬£¬£¬Inc.£©µÄÒ»¸öÓÊÏäÕË»§ÔÚ2ÔÂ3ÈÕÖÁ14ÈÕÖ®¼äÔâδÊÚȨ»á¼û£¬£¬£¬£¬£¬£¬¸ÃÕË»§°üÀ¨²¿·ÖGEÔ±¹¤ºÍÏà¹ØÊÜÒæÈ˵ÄÎļþ£¬£¬£¬£¬£¬£¬ÀýÈçÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕË»§ºÅÂë¡¢ÈËΪ±í¡¢¼ÝÕÕ¡¢»¤ÕÕ¡¢ÉúÈÕ¡¢Íê»é֤ʵµÈ£¬£¬£¬£¬£¬£¬GEµÄϵͳδÊܵ½ÊÂÎñÓ°Ïì¡£¡£¡£¡£GEûÓÐ͸¶ÊÜÓ°ÏìµÄÏêϸÈËÊý£¬£¬£¬£¬£¬£¬CanonÌåÏÖ½«Í¨¹ýÒ»¼ÒÃûΪExperianµÄ¹«Ë¾Ãâ·ÑΪÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÁ½ÄêµÄÉí·Ý±£»£»£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/tech-giant-ge-discloses-data-breach-after-service-provider-hack/
2.FireEyeÖÒÑÔÕë¶ÔICSµÄºÚ¿Í¹¤¾ßÕýÔÚÂþÒç
FireEyeÇå¾²Ñо¿Ö°Ô±ÖÒÑԳƣ¬£¬£¬£¬£¬£¬Õë¶Ô¹¤Òµ¿ØÖÆÏµÍ³£¨ICS£©µÄºÚ¿Í¹¤¾ßÕýÔÚÂþÒ磬£¬£¬£¬£¬£¬Õâ½µµÍÁ˹¥»÷ÕßµÄ×¼ÈëÃż÷£¬£¬£¬£¬£¬£¬²¢ÔöÌíÁ˹¤ÒµÆóÒµµÄΣº¦¡£¡£¡£¡£ÔÚ×î½üµÄÒ»ÏîÑо¿ÖУ¬£¬£¬£¬£¬£¬FireEyeÆÊÎöÁ˽üÄêÀ´Ðû²¼µÄ¾ßÓÐÕë¶ÔICS¹¦Ð§µÄËùÓкڿ͹¤¾ß£¬£¬£¬£¬£¬£¬ËäȻһЩ¹¤¾ßÔçÔÚ2004Äê¾ÍÒѽ¨É裬£¬£¬£¬£¬£¬µ«´ó´ó¶¼¶¼ÊÇÔÚÒÑÍù10ÄêÖпª·¢µÄ¡£¡£¡£¡£FireEyeÌåÏÖ´ó´ó¶¼ºÚ¿Í¹¤¾ß¶¼Ó빩ӦÉÌÎ޹أ¬£¬£¬£¬£¬£¬Ö÷ҪɨÃèICSÍøÂçÉϵÄͨÓÃÖ¸±ê£¬£¬£¬£¬£¬£¬µ«Ò²ÓÐÕë¶ÔÌØ¶¨ICS¹©Ó¦ÉÌ¿ª·¢µÄ¹¤¾ß£¬£¬£¬£¬£¬£¬ÕâЩ¹¤¾ßÖÐ60%¶¼ÊÇÕë¶ÔÎ÷ÃÅ×Ó¡£¡£¡£¡£Æ¾Ö¤FireEyeµÄ˵·¨£¬£¬£¬£¬£¬£¬´ó´ó¶¼ICSºÚ¿Í¹¤¾ß¶¼ÊÇ»ùÓÚµ±½ñÈýÖÖ×îÊ¢ÐеÄÉøÍ¸²âÊÔ¿ò¼ÜÄ£¿£¿£¿£¿£¿£¿£¿£¿é-Metasploit¡¢Core ImpactºÍImmunity Canvas¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/fireeye-warns-about-the-proliferation-of-ready-made-ics-hacking-tools/
3.WildPressure¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Õë¶ÔÖж«¹¤Òµ×éÖ¯
¿¨°Í˹»ùʵÑéÊÒµÄÇ徲ר¼Ò·¢Ã÷Õë¶ÔÖж«¹¤Òµ×éÖ¯µÄAPT¹¥»÷»î¶¯WildPressure¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ2019Äê8ÔÂÊ״η¢Ã÷ÁËWildPressure£¬£¬£¬£¬£¬£¬ÆäʱÑо¿Ö°Ô±¼ì²âµ½Ò»¸öеĶñÒâÈí¼þMilum¡£¡£¡£¡£MilumÊÇÒ»¸ö³ÉÊìµÄC++ľÂí£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÓëÒÑÖªµÄÈκι¥»÷»î¶¯¾ùûÓÐÏàËÆµÄ´úÂ룬£¬£¬£¬£¬£¬Ò²Ã»Óй¥»÷Ä¿µÄÉϵĽ»Ö¯¡£¡£¡£¡£ÏÖʵÉÏ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±½öÔÚÒ»¸ö¹ú¼ÒÖз¢Ã÷ÁË3¸ö×ÔÁ¦µÄÑù±¾¡£¡£¡£¡£Ä¿½ñÈÔ²»ÇåÎú¹¥»÷ÕßÈö²¥MilumľÂíµÄ·½·¨£¬£¬£¬£¬£¬£¬²¢ÇÒÎÞ·¨½«Æä¹éÒò£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÒÔΪ¹¥»÷Õß¿ÉÄÜ»áÔÚÆäËü¹¥»÷»î¶¯ÖÐÖØ¸´Ê¹ÓøÃľÂí¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/wildpressure-targets-industrial-in-the-middle-east/96360/
4.ºÚ¿Íͨ¹ýÐ®ÖÆÂ·ÓÉÆ÷DNSÈö²¥OskiľÂí
ÔÚ×î½üµÄ¹¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýÐ®ÖÆÂ·ÓÉÆ÷µÄDNSÉèÖÃÔÚÓû§µÄWebä¯ÀÀÆ÷ÉÏÏÔʾÐéαµÄCOVID-19¾¯±¨²¢·Ö·¢ÐÅÏ¢ÇÔȡľÂíOski¡£¡£¡£¡£ÏÖÔÚÉв»ÖªµÀ¹¥»÷ÕßÔõÑù»ñµÃ¶Ô·ÓÉÆ÷µÄ»á¼ûºÍ¸ü¸ÄÆäDNSÉèÖ㬣¬£¬£¬£¬£¬µ«¿ÉÄÜÊÇͨ¹ýÈõÃÜÂëÀ´¾ÙÐÐÔ¶³Ì»á¼û¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬£¬¹¥»÷Õß½«Â·ÓÉÆ÷µÄDNSЧÀÍÆ÷¸ü¸ÄΪ109.234.35.230ºÍ94.103.82.249£¬£¬£¬£¬£¬£¬µ±WindowsÔËÐÐNCSI̽ÕëÀ´¼ì²éÅÌËã»úÊÇ·ñÒÑÅþÁ¬µ½»¥ÁªÍøÊ±£¬£¬£¬£¬£¬£¬¶ñÒâDNSЧÀÍÆ÷½«Æä·¢Ë͵½¶ñÒâIP 176.113.81.159£¬£¬£¬£¬£¬£¬¸ÃIPÉϵÄÍøÕ¾ÒªÇóÓû§ÏÂÔØ²¢×°ÖöñÒâµÄ¡°Emergency-COVID-19 Informator¡±»ò¡°COVID-19 Inform App¡±£¬£¬£¬£¬£¬£¬¸Ã³ÌÐòÏÖʵÉÏÊÇÐÅÏ¢ÇÔȡľÂíOski¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-hijack-routers-dns-to-spread-malicious-covid-19-apps/
5.΢ÈíÐû²¼AstarothľÂíй¥»÷Á´µÄÆÊÎö±¨¸æ
ƾ֤΢ÈíDefender ATPÍŶӵÄÒ»·ÝÑо¿±¨¸æ£¬£¬£¬£¬£¬£¬AstarothľÂíÔÚ2Ô³õ±äµÃ»îÔ¾£¬£¬£¬£¬£¬£¬²¢ÇÒ¹¥»÷ÕßÒýÈëÁËÐÂÊÖÒÕʹ¹¥»÷Á´Ô½·¢Òþ²Ø¡£¡£¡£¡£AstarothÏÖÔÚÑïÆúÁËÒÀÀµWindowsÖÎÀí¹¤¾ßÏÂÁîÐУ¨WMIC£©µÄÏà¹ØÌÓ±ÜÊÖÒÕ£¬£¬£¬£¬£¬£¬×ªÏòÀÄÓñ¸ÓÃÊý¾ÝÁ÷£¨ADS£©À´Òþ²Ø¶ñÒâºÉÔØÒÔ¼°ÀÄÓÃÕýµ±Àú³ÌExtExport.exe£¨Ò»ÖÖºÜÊDz»³£¼ûµÄ¹¥»÷ǰÑÔ£©À´¼ÓÔØÓÐÓúÉÔØ¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÆÏÌÑÑÀÓïµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬ÓʼþÖаüÀ¨Ö¸ÏòÍйܴ浵ÎļþµÄURLÁ´½Ó£¬£¬£¬£¬£¬£¬ÎļþÖаüÀ¨ÓÕµ¼ÐÔµÄLNKÎļþ£¬£¬£¬£¬£¬£¬µã»÷ʱLNKÎļþ½«ÔËÐлìÏýµÄBATÏÂÁî¡£¡£¡£¡£BATÏÂÁîŲÓÃexplorer.exeÀ´ÔËÐÐJavaScriptÎļþ£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃGetObjectÊÖÒÕÔÚÄÚ´æÖÐÔËÐиü´óµÄÖ÷JavaScript£¬£¬£¬£¬£¬£¬È»ºóÖ÷¾ç±¾Å²ÓÃBITSAdminµÄ¶à¸öʵÀý´ÓC2ÏÂÔØ¶à¸ö¶þ½øÖÆBlob£¬£¬£¬£¬£¬£¬²¢Á¬ÏµÈý¸öBlobÐγɲ¢¼ÓÔØµÚÒ»½×¶Î¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬×îºó¶ÁÈ¡ADSÁ÷²¢½âÃÜΪAstarothµÄDLL£¬£¬£¬£¬£¬£¬·´Éä¼ÓÔØµ½userinit.exeÖС£¡£¡£¡£ÔÚÕâ¸öÀú³ÌÖÐAstaroth²»»á½Ó´¥´ÅÅÌ£¬£¬£¬£¬£¬£¬Ö±½Ó¼ÓÔØµ½ÄÚ´æÖС£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.microsoft.com/security/blog/2020/03/23/latest-astaroth-living-off-the-land-attacks-are-even-more-invisible-but-not-less-observable/
6.»ÝÆÕÔÙ´ÎÖÒÑÔ²¿·ÖSSD½«ÔÚÔËÐÐ4ÍòСʱºó·ºÆð¹ÊÕÏ
»ÝÆÕÔÙ´ÎÖÒÑÔÆä¿Í»§£¬£¬£¬£¬£¬£¬Ä³Ð©´®ÐÐÅþÁ¬µÄSCSI¹Ì̬ӲÅÌ»áÔÚÔËÐÐ4ÍòСʱ£¨Ï൱ÓÚ4Äê206Ìì16¸öСʱ£©ºó·ºÆð¹ÊÕÏ£¬£¬£¬£¬£¬£¬Êý¾ÝºÍÓ²Å̾ùÎÞ·¨»Ö¸´¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ2019Äê11ÔÂÐû²¼ÁËÀàËÆµÄͨ¸æ£¬£¬£¬£¬£¬£¬Æäʱ²¿·ÖSSDÔÚÔËÐÐ32768Сʱºó±¬·¢¹ÊÕÏ¡£¡£¡£¡£ÕâÒ»´ÎÊÜÓ°ÏìµÄSSDÐͺŰüÀ¨EK0800JVYPN¡¢EO1600JVYPP¡¢MK0800JVYPQºÍMO1600JVYPR£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ²úÆ·°üÀ¨¶àÖÖHPЧÀÍÆ÷ºÍ´æ´¢²úÆ·£¬£¬£¬£¬£¬£¬ÈçHP ProLiant¡¢Synergy¡¢Apollo 4200µÈ¡£¡£¡£¡£HPEÔ¤¼Æ£¬£¬£¬£¬£¬£¬Î´´ò²¹¶¡µÄSSD×îÔ罫ÔÚ2020Äê10ÔÂ×îÏÈ·ºÆð¹ÊÕÏ£¬£¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ìÓ¦Óù̼þ¸üС£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hpe-warns-of-new-bug-that-kills-ssd-drives-after-40-000-hours/


¾©¹«Íø°²±¸11010802024551ºÅ